The European Parliament has voted in favour of a resolution that calls on all EU member states to “drop any criminal charges...
A cyber-security industry group has published new research on the CryptoWall ransomware campaign, finding that the attacks have generated more than $300m...
The two platforms drive different devices. But would combining them really be a bad thing? On Thursday, the The Wall Street Journal...
A new chat tool has been launched in an effort to improve the security of online messaging. Tor Messenger allows users to...
Calling the formal recognition of the .onion as a Special-use Domain Name by the Internet Engineering Task Force (IETF) “a small and...
A silver Jaguar XFR parked in a parking lot in Auckland, New Zealand was stolen with the help of a hacking device that sends...
WhatsApp, one of the most popular online calling apps, has been exposed by a group of researchers who identified how app’s internal...
Ghosts, monsters and the living dead can all send a chill down one's spine. Ransomware, for some people, is just as spooky....
Short Bytes: Diebold has developed a concept ATM that reduces the use of plastic money for cash withdrawal to zero. The self-serving...
Short Bytes: Attackers are now using an android malware app which camouflages itself as a Microsoft Word document. The malware once triggered, scans...
Short Bytes: The Tor Project has announced the release of the beta version of its Tor Messenger that allows you to chat...
Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the...
Authorities in several European countries announced they have coordinated an operation to arrest criminals using the popular DroidJack RAT. Android RATs are becoming...
600k customer identities have been stolen in 2014 and according to government officials thousands of Britons data available for sale in the...
Experts at Symantec have discovered a new variant of the Chikdos DDoS-Trojan that is targeting MySQL servers worldwide. There is a malware...
Thirteen homes in Germany were raided as part of the operation – Image by Thinkstock Police have raided homes in five European countries...
There’s another data breach to report – and it’s a big one, affecting approximately 13 million customers of the “free” web hosting...
Law enforcement agencies across Europe have searched homes this week, as part of an international crackdown against users of a notorious piece...
A security researcher (Troy Hunt), who owns the website (haveibeenpwned) have discovered a possible breach of webhosting service 000Webhost servers. Basically, hunt’s...
Short Bytes: Apple boasts one of the best workforces in the tech world with employees ranging from a software engineer to a...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment